Another week with more than 100 new vulnerabilities discovered. Especially noteworthy are the Firefox, F-Secure and imap problems
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************ Sponsored By Sourcefire ************************
Sourcefire, the creator of Snort®, is offering the Open Source Snort community two comprehensive courses: "Snort: Building and Operating" and "Snort Rules."
Purchase both Snort courses either as an instructor-led or 60-day online training bundle and receive a FREE Snort Certified Professional exam (save $395).
For more information contact Sourcefire Training at 800.501.6008 or visit: http://www.sans.org/info.php?id=1180
*************************************************************************
Latest Security Training Schedule - http://www.sans.org/index.php
*************************************************************************
*********************** Sponsored Links: ******************************
1) Looking to get more out of SSL VPNs? Read industry analyst Don Jones' new eBooklet "SSL VPNs Lessons Learned"
http://www.sans.org/info.php?id=1181
************************************************************************
Part I is compiled by Rohit Dhamankar and Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Mozilla Foundation released version 1.5.0.4 for Firefox browser as well as Thunderbird email client last week. The new versions fix 12 vulnerabilities in Firefox and 8 vulnerabilities in Thunderbird. The most severe of the vulnerabilities can allow a webpage or an HTML email to execute arbitrary code on a user's system. The technical details about the low severity flaws can be obtained from the Mozilla bugzilla. The details about the code execution flaws are not available yet.
Status: Upgrade to Firefox and Thunderbird to version 1.5.0.4
Description: F-Secure's Web console is designed for the web-based management of the anti-virus software. This HTTP server contains a buffer overflow that can be exploited by unauthenticated attackers to execute arbitrary code. The technical details regarding this flaw have not been publicly posted. Note that the web console server is accessible only to the local host in the default configuration. However, for convenience, some administrators may configure access for the web console from any hosts in their network.
Status: F-Secure has released hotfixes for the Microsoft Exchange version 6.40 and Internet Gatekeeper version 6.50. Upgrade Internet Gatekeeper to version 6.60. Block HTTP requests to port 25023/tcp (default web console port) from the Internet.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: Snort, a popularly used IDS, contains a vulnerability that can be exploited by an attacker to evade Snort's HTTP attack detection routines. The evasion can be performed by simply adding a carriage return "\r" at the end of an URI in a malicious HTTP request. Note that this technique can be used to bypass a number of Apache webserver attacks detected by Snort.
Status: Sourcefire will release fixed versions 2.4.5 and 2.6.0 on June 5th. A third-party patch is currently available for this issue.
Description: The MDaemon IMAP server reportedly contains a buffer overflow that can be triggered by an IMAP command longer than 99554 bytes. The flaw can be exploited to execute arbitrary code with potentially "SYSTEM" privileges. A proof-of-concept exploit has been publicly posted.
Status: Vendor not confirmed, no patches available.
Description: wodsFTP is an ActiveX component that supports SFTP client functions. This ActiveX has been wrongly marked as "safe for scripting". A malicious SFTP server can exploit this flaw to download arbitrary files to a client system that has wodsFTP ActiveX installed. Note that several free and commercial FTP servers use this component.
Status: No patch is available from the vendor yet. Set the killbit for the wodsFTP ActiveX component. The CLSID for the wodSFTP control is: {6795FA0F-35C3-4BEB-B3AA-F19DB0B228EA}.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: Stardust is the first proof-of-concept macro-virus that targets StarOffice and OpenOffice programs. The virus is written in "StarBasic", the scripting language used for StarOffice/OpenOffice. Note that the virus affects installations of these programs on Windows/UNIX/Mac platforms.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5021 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2006. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.